RFE request to add additional columns in the vulnerability report in RHACS4
Issue
- The ACS vulnerability report currently lacks the ability to distinguish whether vulnerabilities originate from the OS level or from the application image level. An enhancement is needed include two additional columns in the vulnerability report: one indicating the
source of the vulnerability(OS or application image) and another specifying theExact file pathwhere the vulnerability exists. - The vulnerability report covers issues found in both base image packages and application package artifacts (such as JAR files, Python builds, and NPM packages). However, it is difficult to determine whether identified vulnerabilities come from base image packages or application artifacts. Adding details that specify the origin (image vs. application artifacts) along with the package file location would provide clearer visibility, making it easier to isolate and remediate vulnerabilities effectively.
Environment
- Red Hat Advanced Cluster Security for Kubernetes (RHACS)
- 4
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.